Figure 6: Cognitive process based on data analysis process..
REFERENCES
Andrade, R., Torres, J., and L. Tello-Oquendo, 2018.
Cognitive Security Tasks Using Big Data Tools 2018
International Conference on Computational Science and
Computational Intelligence (CSCI) pp. 100-105, doi:
10.1109/CSCI46756.2018.00026.
Andrade, R and Torres, J. 2018. Self-Awareness as an
enabler of Cognitive Security 2018 IEEE 9th Annual
Information Technology, Electronics and Mobile
Communication Conference (IEMCON) pp. 701-708,
doi: 10.1109/IEMCON.2018.8614798.
Andrade, R Torres, J and Tello-Oquendo, L. 2018.
Cognitive Security Tasks Using Big Data Tools 2018
International Conference on Computational Science and
Computational Intelligence (CSCI), pp. 100-105, doi:
10.1109/CSCI46756.2018.00026.
Certsocietegenerale/IRM. 2021. Retrieved April 26 2021,
from https://github.com/
certsocietegenerale/IRM/tree/master/EN
Tello-Oquendo L, Tapia F, Fuertes W, Andrade R, Erazo N,
Torres J, and Cadena A, 2019. A Structured Approach
to Guide the Development of Incident Management
Capability for Security and Privacy. In Proceedings of
the 21st International Conference on Enterprise
Information Systems - Volume 2: ICEIS, ISBN 978-
989-758-372-8 ISSN 2184-4992, pages 328-336. DOI:
10.5220/0007753503280336
Chockalingam S, Pieters W, Teixeira A, van Gelder P, 2017.
Bayesian Network Models in Cyber Security: A
Systematic Review. Secur. IT Syst. 2017 105–122.
doi:10.1007/978-3-319-70290-2.
Elastic. Eland: DataFrames and Machine Learning backed
by Elasticsearch - eland 7.10.0b1 documentation.
Available online: https://eland.readthedocs.io/en/
7.10.0b1. (Accessed on January 11 2021)
Fahim A.M, Salem A.M, Torkey F.A, Ramadan M.A., 2006.
An efficient enhanced k -means clustering algorithm. J.
Zhejiang Univ. Sci. A, 7, 1626–1633.
doi:10.1631/jzus.2006.A1626.
Wickham H, Bryan J., 2021. Read Excel Files. Available
online: https://readxl.tidyverse.org. (accessed on
January 11 2021)
Hamerly G, Elkan C. 2004. Learning the k in k -means. Adv.
Neural Inf. Process. Syst. 17, 281–288.
Olukanmi P.O, Nelwamondo F, Marwala T, 2018. k -
Means-Lite: Real Time Clustering for Large Datasets.
2018 5th Int. Conf. Soft Comput. Mach. Intell. pp. 54–
59. doi:10.1109/ISCMI.2018.8703210.
Salman T., Bhamare D., Erbad A., Jain R., and Samaka M.
2017. Machine Learning for Anomaly Detection and
Categorization in Multi-Cloud Environments. 2017
IEEE 4th International Conference on Cyber Security
and Cloud Computing (CSCloud).
doi:10.1109/cscloud.2017.15
B. Subba, S. Biswas, and S. Karmakar, 2016. Enhancing
performance of anomaly-based intrusion detection
systems through dimensionality reduction using
principal component analysis, in 2016 IEEE
International Conference on Advanced Networks and
Telecommunications Systems (ANTS), IEEE, pp. 1-6.
A.-H. Muna, N. Moustafa, and E. Sitnikova, 2018.
Identificationof malicious activities in industrial Internet
of things based on deep learning models, Journal of
Information Security and Applications, 41, 1-11
J. Lee, J. Kim, I. Kim, and K. Han, 2019. Cyber Threat
Detection Based on Artificial Neural Networks Using
Event Profiles, IEEE Access, 7, 165607-165626
P. Mishra, V Varadharajan, U Tupakula, E. S. J. I. C. S. Pilli,
and Tutorials, 2018. A detailed investigation and
analysis of using machine learning techniques for
intrusion detection, 21(1), 686-728
J. Malik and F.A.J.C.C. Khan, 2018. A
hybridtechniqueusingbinary particleswarm optimization
and decision tree pruning for network intrusion
detection, 21(1), 667-680
Alswailem A, Alabdullah B, Alrumayh N, and Alsedrani A,
2019. Detecting Phishing Websites Using Machine
Learning. 2019 2nd International Conference on
Computer Applications & Information Security
(ICCAIS). doi:10.1109/cais.2019.8769571
Wankhede S, and Kshirsagar D, 2018. DoS Attack Detection
Using Machine Learning and Neural Network. 2018
Fourth International Conference on Computing
Communication Control and Automation (ICCUBEA).
doi:10.1109/iccubea.2018.8697702
Internet Live Stats. 2021. Total number of websites Home
Page. Available online: https://www.internetlivestats.
com/ watch/websites (accessed on January 11 2021)
Vermeer S, Trilling D, Kruikemeier T, and De Vreese C,
2020. Online News User Journeys: The Role of social
media, News Websites, and Topics, Digital Journalism,
8(9), 111431141
Richardson, L. 2020. Beautiful Soup Documentation —
Beautiful Soup 4.9.0 documentation, Crummy.com,
2020. [Online]. Available: https://www.crummy.com/
software/BeautifulSoup/ bs4/doc/. [Accessed: 30- Apr-
2021].
NLTK Project, 2021. Natural Language Toolkit — NLTK
3.6.2 documentation, Nltk.org, 2021. [Online].
Available: https://www.nltk.org/. [Accessed: 30- Apr-
2021].
Wickham H 2014. Tidy data. The Journal of Statistical
Software, 14(5), Retrieved from: http://www.
jstatsoft.org/v59/i10.